interception of torrent traffic balccon2k14
DESCRIPTION
Balkan Computer Congress is an international hacker conference organized by LUGoNS – Linux Users Group of Novi Sad and Wau Holland Foundation from Hamburg and Berlin. It is the second conference taking place on the Balkan, where some 20 years ago people were at war with each other. Now the BalCCon brings together hackers, hacktivists and computer enthusiasts from this area and they are joined by fellow hackers from all over the world. This event emphasizes the role of hacking as a mean of peaceful cooperation and international understanding. The program consist of numerous presentations, workshops and lectures about information, privacy, technology, programming, free software and socio-political issues. One part of the congress will be dedicated to hacking, project and hacks. https://2k14.balccon.org/TRANSCRIPT
![Page 1: Interception of torrent traffic BalCCon2k14](https://reader033.vdocument.in/reader033/viewer/2022042614/558aa83dd8b42a6e408b469c/html5/thumbnails/1.jpg)
Case Study: interception of torrent traffic and what should we do about
it
Jelena Jovanović
![Page 2: Interception of torrent traffic BalCCon2k14](https://reader033.vdocument.in/reader033/viewer/2022042614/558aa83dd8b42a6e408b469c/html5/thumbnails/2.jpg)
Right to share and seek culture and knowledge
“Everyone has the right to freedom of expression. This right shall include freedom to hold opinions and to receive and impart information and ideas without interference by public authority and regardless of frontiers.”
(European Convention of Human Rights, article 10)
![Page 3: Interception of torrent traffic BalCCon2k14](https://reader033.vdocument.in/reader033/viewer/2022042614/558aa83dd8b42a6e408b469c/html5/thumbnails/3.jpg)
File-sharing is state of mind!
Filesharing is not a side-effect of internet
It changed the way we communicate
NOT a crime!
![Page 4: Interception of torrent traffic BalCCon2k14](https://reader033.vdocument.in/reader033/viewer/2022042614/558aa83dd8b42a6e408b469c/html5/thumbnails/4.jpg)
Copyright regime
![Page 5: Interception of torrent traffic BalCCon2k14](https://reader033.vdocument.in/reader033/viewer/2022042614/558aa83dd8b42a6e408b469c/html5/thumbnails/5.jpg)
5 scenarios of obtaining user’s data
![Page 6: Interception of torrent traffic BalCCon2k14](https://reader033.vdocument.in/reader033/viewer/2022042614/558aa83dd8b42a6e408b469c/html5/thumbnails/6.jpg)
1. server seizure by the FBI
![Page 7: Interception of torrent traffic BalCCon2k14](https://reader033.vdocument.in/reader033/viewer/2022042614/558aa83dd8b42a6e408b469c/html5/thumbnails/7.jpg)
2. DMCA or LAW Agency sets up own torrent server and monitors
who downloads content
![Page 8: Interception of torrent traffic BalCCon2k14](https://reader033.vdocument.in/reader033/viewer/2022042614/558aa83dd8b42a6e408b469c/html5/thumbnails/8.jpg)
3. They track our IP adresses
![Page 9: Interception of torrent traffic BalCCon2k14](https://reader033.vdocument.in/reader033/viewer/2022042614/558aa83dd8b42a6e408b469c/html5/thumbnails/9.jpg)
4. Providers on behalf of copyright holders perform continuous
interception of user data
![Page 10: Interception of torrent traffic BalCCon2k14](https://reader033.vdocument.in/reader033/viewer/2022042614/558aa83dd8b42a6e408b469c/html5/thumbnails/10.jpg)
5. The execution of court decisions
![Page 11: Interception of torrent traffic BalCCon2k14](https://reader033.vdocument.in/reader033/viewer/2022042614/558aa83dd8b42a6e408b469c/html5/thumbnails/11.jpg)
![Page 12: Interception of torrent traffic BalCCon2k14](https://reader033.vdocument.in/reader033/viewer/2022042614/558aa83dd8b42a6e408b469c/html5/thumbnails/12.jpg)
![Page 13: Interception of torrent traffic BalCCon2k14](https://reader033.vdocument.in/reader033/viewer/2022042614/558aa83dd8b42a6e408b469c/html5/thumbnails/13.jpg)
Say no to copyright trolling!